Search results for Actors Downloaded

1091 available news

Hackers exploit 14-year-old CMS editor on govt, edu...
Threat actors are exploiting a CMS editor discontinued 14 years ago to compromise...
Source: BleepingComputer

2024-02-26 19:59:38

The Risk of AI Voice Cloning: Q&A With an AI Hacker...
HackerOne Senior Solutions Architect and AI Hacker Dane Sherrets demonstrates how...
Source: HackerOne - Bug Bounty, Vulnerability Coordination

2024-02-23 17:58:58
Pub

Kaisen Linux | The distribution for professional IT...
Kaisen Linux is a distribution dedicated for IT professional based on Debian GNU/Linux....

2024-02-27 01:11:29

The Risk of AI Voice Cloning: Q&A With an AI Hacker...
In the following Q&A and video, HackerOne Senior Solutions Architect and AI Hacker...
Source: HackerOne

2024-02-23 16:24:44

New SSH-Snake Malware Abuses SSH Credentials To Spread...
Threat actors abuse SSH credentials to gain unauthorized access to systems and networks....
Source: Latest Hacker and Security News

2024-02-23 07:14:50

TrollAgent That Infects Systems Upon Security Program...
AhnLab SEcurity intelligence Center (ASEC) recently discovered that malware strains...
Source: AhnLab

2024-02-23 00:28:12

I-S00N China File Drop - ThreatWire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ Support ThreatWire → https://patreon.com/threatwire @endingwithali...
Source: Hak5

2024-02-22 18:03:20

Hackers launched 250,000+ Attacks to Exploit Ivanti...
Ivanti Connect Secure vulnerabilities were disclosed in January 2024 as a potential...
Source: Latest Hacker and Security News

2024-02-22 11:06:27

VoltSchemer – Wireless Charger Attack Boils...
Threat actors target wireless chargers for multiple malicious activities, such as...
Source: Latest Hacker and Security News

2024-02-22 08:23:11

Becoming a Dark Knight: Adversary Emulation Demonstration...
Batman once said, "you either die a hero or live long enough to see yourself become...
Source: Black Hat

2024-02-21 17:14:19

Cybersecurity Salary Guide: How Much Can You Earn?
This week in cybersecurity from the editors at Cybercrime Magazine – Read the...
Source: Cybersecurity Research

2024-02-21 13:49:53

Authorities Warns Of North Korean Attackers Stealing...
Threat actors target military technologies to gain a strategic advantage, access...
Source: Latest Hacker and Security News

2024-02-21 06:54:31